{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T02:37:02Z","timestamp":1755225422109,"version":"3.43.0"},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2000,11,1]],"date-time":"2000-11-01T00:00:00Z","timestamp":973036800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2000,11,1]],"date-time":"2000-11-01T00:00:00Z","timestamp":973036800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Networks"],"published-print":{"date-parts":[[2000,11]]},"DOI":"10.1023\/a:1019122522053","type":"journal-article","created":{"date-parts":[[2003,2,19]],"date-time":"2003-02-19T18:30:27Z","timestamp":1045679427000},"page":"391-399","source":"Crossref","is-referenced-by-count":0,"title":["A deadlock model for a multi\u2010service medium access protocol employing multi\u2010slot N\u2010ary stack algorithm (msSTART)"],"prefix":"10.1007","volume":"6","author":[{"given":"Fraser","family":"Cameron","sequence":"first","affiliation":[]},{"given":"Moshe","family":"Zukerman","sequence":"additional","affiliation":[]},{"given":"Milosh","family":"Ivanovich","sequence":"additional","affiliation":[]},{"given":"Sivathasan","family":"Saravanabavananthan","sequence":"additional","affiliation":[]},{"given":"Ranil","family":"Hewawasam","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"330573_CR1","volume-title":"Data Networks","author":"D. Bertsekas","year":"1992","unstructured":"D. Bertsekas and R. Gallager, Data Networks(Prentice-Hall, Englewood Cliffs, NJ, 1992) (2nd edition).","edition":"2nd edition"},{"key":"330573_CR2","unstructured":"C. Bisdikian, A review of random access algorithms, IEEE 802.14 Working Group Document No. 802.14-96\/019 (January 1996)."},{"key":"330573_CR3","unstructured":"C. Bisdikian, Performance analysis of the multislot N-ary stack random access algorithm (msSTART), IEEE 802.14 Working Group Document No. 802.14-96\/117 (May 1996)."},{"issue":"3","key":"330573_CR4","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/35.486811","volume":"34","author":"C. Bisdikian","year":"1996","unstructured":"C. Bisdikian, B. McNeil, R. Norman and R. Zeisz, MLAP: A MAC access protocol for the HFC 802.14 network, IEEE Communications Magazine 34(3) (March 1996) 114\u2013121.","journal-title":"IEEE Communications Magazine"},{"key":"330573_CR5","doi-asserted-by":"crossref","unstructured":"R. Cotter, D. Medhi and D. Tipper, Traffic backlog and impact on network dimensioning for survivability for wide-area VP-based ATM networks, in: Proceedings of the 15th International Teletraffic Congress, Washington, DC (June 1997).","DOI":"10.1016\/S1388-3437(97)80072-8"},{"key":"330573_CR6","doi-asserted-by":"crossref","unstructured":"D.P. Heyman, An analysis of the carrier-sense multiple-access protocol, The Bell System Technical Journal 61(8) (1982).","DOI":"10.1002\/j.1538-7305.1982.tb03098.x"},{"key":"330573_CR7","unstructured":"M. Ivanovich and M. Zukerman, Worst case signaling traffic for a multi-service access protocol, in: IEEE ICC(1998)."},{"key":"330573_CR8","unstructured":"M. Ivanovich, M. Zukerman and F. Cameron, A study of deadlock models for a multi-service access protocol employing a slotted ALOHA signaling channel (submitted for publication)."},{"key":"330573_CR9","unstructured":"M. Ivanovich and M. Zukerman, Evaluation of priority and scheduling schemes for an IEEE 802.14 MAC protocol loaded by real traffic, in: Proceedings of INFOCOM '98, San Francisco (April 1998)."},{"key":"330573_CR10","volume-title":"Network control by Bayesian broadcast","author":"R.L. Rivest","year":"1985","unstructured":"R.L. Rivest, Network control by Bayesian broadcast, Report MIT\/LCS\/TM-285, Laboratory for Computer Science, Cambridge, MA (1985)."},{"key":"330573_CR11","unstructured":"D. Sala, MAC protocols for multimedia data over HFC architecture, Georgia Tech Technical Report GIT-CC-95-48 (October 1995)."},{"key":"330573_CR12","unstructured":"D. Sala, D. Hartman and J.O. Limb, Comparison of algorithms for station registration on power-up in an HFC Network, IEEE 802.14 Working Group Document No. 802.14-96\/012 (January 1996)."},{"key":"330573_CR13","unstructured":"D. Sala and J.O. Limb, A protocol for efficient transfer of data over fibre\/cable systems, in: Proceedings of INFOCOM '96, San Francisco (1996)."}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1019122522053.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1019122522053\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1019122522053.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T11:53:38Z","timestamp":1755086018000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1019122522053"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,11]]},"references-count":13,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2000,11]]}},"alternative-id":["330573"],"URL":"https:\/\/doi.org\/10.1023\/a:1019122522053","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2000,11]]}}}